Skip to content

Conversation

@Regzox
Copy link
Contributor

@Regzox Regzox commented Nov 27, 2025

@Regzox Regzox changed the base branch from develop to master_8.0.x November 27, 2025 13:34
@vitam-prg
Copy link
Collaborator

Logo
Checkmarx One – Scan Summary & Details91d8a991-68aa-4d13-b9b4-620ffd2345ed

New Issues (646)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2019-17571 Maven-log4j:log4j-1.2.17
detailsDescription: Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute ar...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: BjRCgbA6VJ2FpeHwXLtAjb%2BPGXqGh7oy2vZnI4nn4KU%3D
Vulnerable Package
CRITICAL CVE-2022-23305 Maven-log4j:log4j-1.2.17
detailsDescription: By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters fro...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: eQmCyCS9iJF64I6J7F%2BxjzambtB0tuCE58C%2FPV65XLY%3D
Vulnerable Package
CRITICAL CVE-2022-28890 Maven-org.apache.jena:jena-core-2.11.2
detailsRecommended version: 4.2.0
Description: A vulnerability in the RDF/XML parser of Apache Jena allows an attacker to cause an external DTD to be retrieved. This issue affects Apache Jena ve...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: Yn0IgsjwSQV9aTS99X37iUwoF9PMwS%2BYFUDsMf7Rjt8%3D
Vulnerable Package
CRITICAL CVE-2024-31573 Maven-org.xmlunit:xmlunit-core-2.8.4
detailsRecommended version: 2.10.0
Description: XMLUnit for Java has Insecure Defaults when Processing XSLT Stylesheets. This issue affects the package org.xmlunit:xmlunit-core versions prior to ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: P84YfvRraHVcOJaxF%2Fk2q4bq8ZkhoQqH8woSjLkdZrI%3D
Vulnerable Package
CRITICAL CVE-2024-50379 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.75
detailsRecommended version: 9.0.110
Description: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits Remote Code Execution on case-insen...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: e8yqvYiAfkfa0HATRy9zUHClE7b0IqOV8qwfIEA5EKQ%3D
Vulnerable Package
CRITICAL CVE-2024-52316 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.75
detailsRecommended version: 9.0.110
Description: Unchecked Error Condition vulnerability in Apache Tomcat versions 9.0.0-M1 through 9.0.95, 10.1.0-M1 through 10.1.30, and 11.0.0-M1 through 11.0.0-...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: FIzpdEFI5KRpXwJRD9duoRDlf8MZJZaMZSp5vPGCp0I%3D
Vulnerable Package
CRITICAL CVE-2024-53990 Maven-org.asynchttpclient:async-http-client-2.12.3
detailsRecommended version: 2.12.4
Description: The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making a...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: y%2BcUw78jlS7nUSW3YQJR2iPMmttl3zzwe9Z9KrSi%2Bok%3D
Vulnerable Package
CRITICAL CVE-2024-56337 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.75
detailsRecommended version: 9.0.110
Description: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. Users running Tomcat on a case insensitive file system with the ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: Im5D%2BLaJ%2F2DUd4mIuVhFEXunjvjmr8OnE448k91xZ7Q%3D
Vulnerable Package
CRITICAL CVE-2025-24813 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.75
detailsRecommended version: 9.0.110
Description: Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution (RCE) and/or Information disclosure and/or malicious content added to...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: iWsdyxCSLeeJ5LPP8Z9Rpeu6xJGv0NaMcy2Zbl5rhCw%3D
Vulnerable Package
CRITICAL CVE-2025-31651 Maven-org.apache.tomcat.embed:tomcat-embed-core-9.0.75
detailsRecommended version: 9.0.110
Description: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability was found within Apache Tomcat. For a subset of unlikely rewrite rule c...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 3GezSrohO4JLZx17PZ0qym%2FCBWHmHJMo8zpFfmbipPM%3D
Vulnerable Package
CRITICAL CVE-2025-4641 Maven-io.github.bonigarcia:webdrivermanager-5.3.0
detailsRecommended version: 6.1.0
Description: An Improper Restriction of XML External Entity Reference vulnerability in Bonigarcia's WebDriverManager on Windows, macOS, and Linux (affecting XML...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: Fcmz%2FpWZ%2FMM2kgFs%2BUSIYByqoet0ryAkUM%2FUiNzmMNM%3D
Vulnerable Package
CRITICAL Cxa9261daf-3755 Maven-org.bouncycastle:bcprov-jdk15on-1.64
detailsRecommended version: 1.65.0.redhat-00001
Description: Bouncy Castle from 1.47 and before 1.69 contains a weak key-hash message authentication code (HMAC) that is only 16 bits long which can result in h...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: LfGDWOxZg%2BeYzGh2cFw%2BIROls2CF855D3WhxENYTK5g%3D
Vulnerable Package
HIGH Absolute_Path_Traversal /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/ProfileInternalController.java: 211
detailsMethod importProfile at line 211 of /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/Prof...
ID: NaNdzNds8fg9zRkloNJVMGEi%2Fqs%3D
Attack Vector
HIGH Absolute_Path_Traversal /api/api-referential/referential-external/src/main/java/fr/gouv/vitamui/referential/external/server/rest/ProfileExternalController.java: 157
detailsMethod importProfileFile at line 157 of /api/api-referential/referential-external/src/main/java/fr/gouv/vitamui/referential/external/server/rest/...
ID: EstjiYWDoA8Bj2Tk%2FcEwZ7GHh5E%3D
Attack Vector
HIGH Absolute_Path_Traversal /api/api-referential/referential-external/src/main/java/fr/gouv/vitamui/referential/external/server/rest/ProfileExternalController.java: 219
detailsMethod importArchivalProfiles at line 219 of /api/api-referential/referential-external/src/main/java/fr/gouv/vitamui/referential/external/server/...
ID: y6qz%2F7zQR0IaLOKE4nPdXczpFGM%3D
Attack Vector
HIGH Absolute_Path_Traversal /api/api-referential/referential-external/src/main/java/fr/gouv/vitamui/referential/external/server/rest/ProfileExternalController.java: 219
detailsMethod importArchivalProfiles at line 219 of /api/api-referential/referential-external/src/main/java/fr/gouv/vitamui/referential/external/server/...
ID: C6nxdpeM%2BJsZwEeqPh7RN2K%2BHQQ%3D
Attack Vector
HIGH Absolute_Path_Traversal /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/ArchivalProfileUnitInternalController.java: 185
detailsMethod importArchivalUnitProfile at line 185 of /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/serv...
ID: mX0Rm4rs6YptNTtJ9Ho9Yg55Qlo%3D
Attack Vector
HIGH Absolute_Path_Traversal /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/FileFormatInternalController.java: 224
detailsMethod importFileFormats at line 224 of /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/...
ID: mFq350GPRPW2JwddndJA8zYxdNE%3D
Attack Vector
HIGH Absolute_Path_Traversal /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/OntologyInternalController.java: 211
detailsMethod importOntology at line 211 of /api/api-referential/referential-internal/src/main/java/fr/gouv/vitamui/referential/internal/server/rest/Ont...
ID: f4O%2FkFRUAm4F1IbliJBabvG2Vi0%3D
Attack Vector
HIGH CVE-2017-9096 Maven-com.lowagie:itext-2.1.7
detailsDescription: The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML ext...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: SScpLJlsESdSEZJkWvyvzFh7%2FTdWkV%2Fhi7VbD58zfvs%3D
Vulnerable Package
HIGH CVE-2021-0341 Maven-com.squareup.okhttp3:okhttp-4.2.2
detailsRecommended version: 4.9.2
Description: In "verifyHostName" method of "OkHostnameVerifier.java", there is a possible way to accept a certificate for the wrong domain due to improperly use...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: t3aZAvd0uI72ocd2wPx5765riz6%2FXi4MU6NMnaySDmI%3D
Vulnerable Package
HIGH CVE-2021-31684 Maven-net.minidev:json-smart-2.3
detailsRecommended version: 2.4.9
Description: A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.x versions prior to 2.4.4...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: YQqlYm40oi2hyjjXL%2BvlqAOsganmFWuWB%2B%2B5LOs8QXc%3D
Vulnerable Package
HIGH CVE-2021-39239 Maven-org.apache.jena:jena-core-2.11.2
detailsRecommended version: 4.2.0
Description: A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: XbNljFoU01wBYNrVMlAwyFIOOvBqoAiyJ8IjoOqEuVU%3D
Vulnerable Package
HIGH CVE-2021-4104 Maven-log4j:log4j-1.2.17
detailsDescription: JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The atta...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: H0oT2v%2FJuT%2BuweaVCUeKOPM1G1MMj0H8a%2B28B6AyseM%3D
Vulnerable Package
HIGH CVE-2022-23302 Maven-log4j:log4j-1.2.17
detailsDescription: JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configurati...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: vqyuJ%2Ff%2Br%2F8WZZ6T0yUU1ekEAcqEp%2B5ZN1GHHxkAKqc%3D
Vulnerable Package
HIGH CVE-2022-23307 Maven-log4j:log4j-1.2.17
detailsDescription: CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0, Chainsaw was a component of Apache Lo...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: mGZSIycmtzecqrb3Tfi1xAbyhON3zYE6FXG1YQqyqdI%3D
Vulnerable Package
HIGH CVE-2022-40151 Maven-com.thoughtworks.xstream:xstream-1.4.19
detailsRecommended version: 1.4.21
Description: Those using Xstream to serialize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: eoJrdTo%2FlJoaNPRUJXibtBoEvSmVFcviwgdUL0hVzmE%3D
Vulnerable Package
HIGH CVE-2022-41966 Maven-com.thoughtworks.xstream:xstream-1.4.19
detailsRecommended version: 1.4.21
Description: XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a sta...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: IztT9ngBas3ioaE%2BQVbYIf2wjXW1uEiktvBkCwd1Cnk%3D
Vulnerable Package
HIGH CVE-2023-20883 Maven-org.springframework.boot:spring-boot-autoconfigure-2.7.3
detailsRecommended version: 2.7.12
Description: In org.springframework.boot:spring-boot-autoconfigure versions through 2.5.14, 2.6.0 through 2.6.14, 2.7.0 through 2.7.11, and 3.0.0 through 3.0.6 ...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: vCV5CG8xcX8LnZIbO%2BW2rcEqFvNRKoAT73%2B5GUm1yoo%3D
Vulnerable Package

More results are available on the CxOne platform

Fixed Issues (648) Great job! The following issues were fixed in this Pull Request
Severity Issue Source File / Package
HIGH Absolute_Path_Traversal /api/api-referential/referential/src/main/java/fr/gouv/vitamui/referential/server/rest/ProfileController.java: 221
HIGH Absolute_Path_Traversal /api/api-referential/referential/src/main/java/fr/gouv/vitamui/referential/server/rest/ProfileController.java: 159
HIGH CVE-2012-0881 Maven-xerces:xercesImpl-2.9.1
HIGH CVE-2013-4002 Maven-xerces:xercesImpl-2.9.1
HIGH CVE-2022-42003 Maven-com.fasterxml.jackson.core:jackson-databind-2.13.4
HIGH CVE-2025-41248 Maven-org.springframework.security:spring-security-core-6.5.1
HIGH CVE-2025-52999 Maven-com.fasterxml.jackson.core:jackson-core-2.13.4
HIGH Cleartext_Submission_of_Sensitive_Information /api/api-iam/iam-client-legacy/src/main/java/fr/gouv/vitamui/iam/client/CasRestClient.java: 88
HIGH Cleartext_Submission_of_Sensitive_Information /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/user/service/UserEmailService.java: 110
HIGH Improper_Restriction_of_XXE_Ref /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
HIGH Improper_Restriction_of_XXE_Ref /api/api-ingest/ingest/src/main/java/fr/gouv/vitamui/ingest/server/rest/IngestController.java: 129
HIGH Passwords And Secrets - Generic Password /vitamui_vars.yml: 210
HIGH Reflected_XSS /api/api-collect/collect/src/main/java/fr/gouv/vitamui/collect/server/rest/TransactionController.java: 183
HIGH Reflected_XSS /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
HIGH Reflected_XSS /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
HIGH Reflected_XSS /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
HIGH Reflected_XSS /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
HIGH Reflected_XSS /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
HIGH Reflected_XSS /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM CVE-2009-2625 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2017-10355 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2018-2799 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2020-14338 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2020-15250 Maven-junit:junit-4.13
MEDIUM CVE-2022-23437 Maven-xerces:xercesImpl-2.9.1
MEDIUM CVE-2022-38752 Maven-org.yaml:snakeyaml-1.31
MEDIUM CVE-2022-41854 Maven-org.yaml:snakeyaml-1.31
MEDIUM CVE-2023-20861 Maven-org.springframework:spring-expression-5.3.22
MEDIUM CVE-2023-20863 Maven-org.springframework:spring-expression-5.3.22
MEDIUM CVE-2024-38808 Maven-org.springframework:spring-expression-5.3.22
MEDIUM CVE-2025-62522 Npm-vite-6.2.0
MEDIUM CVE-2025-8885 Maven-org.bouncycastle:bcprov-jdk18on-1.71
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/TenantController.java: 130
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/TenantController.java: 130
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 239
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 221
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/TenantController.java: 130
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 125
MEDIUM Parameter_Tampering /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 117
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 196
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/TenantController.java: 130
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 296
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 296
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CasController.java: 197
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/SubrogationController.java: 190
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/SubrogationController.java: 190
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/SubrogationController.java: 180
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 199
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 267
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 228
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 210
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 199
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 199
MEDIUM Parameter_Tampering /api/api-iam/iam/src/main/java/fr/gouv/vitamui/iam/server/rest/CustomerController.java: 199
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 117
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 117
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-commons/src/main/java/fr/gouv/vitamui/iam/common/utils/IdentityProviderBuilder.java: 123
MEDIUM Privacy_Violation /api/api-iam/iam-commons/src/main/java/fr/gouv/vitamui/iam/common/utils/IdentityProviderBuilder.java: 122
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 117
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 175
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85
MEDIUM Privacy_Violation /api/api-iam/iam-security/src/main/java/fr/gouv/vitamui/iam/security/service/SecurityService.java: 85

More results are available on the CxOne platform


Use @Checkmarx to reach out to us for assistance.

Just send a PR comment with @Checkmarx followed by a natural language request.

Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR

@Regzox Regzox force-pushed the cp_8.0__bugs_15437 branch from d8a292e to dba0ce6 Compare November 27, 2025 14:18
@Regzox Regzox self-assigned this Nov 27, 2025
@Regzox Regzox added the Cherry-Pick a cherry pick label Nov 27, 2025
@Regzox Regzox added this to the IT 162 milestone Nov 27, 2025
@GiooDev GiooDev changed the title CP 8.0 - bugs #15437 (fix): the confirmation button stays disabled when the notice is updated via a file CP V8.0 - bugs #15437 (fix): the confirmation button stays disabled when the notice is updated via a file Nov 27, 2025
@Regzox Regzox merged commit e70dbea into master_8.0.x Nov 28, 2025
11 checks passed
@Regzox Regzox deleted the cp_8.0__bugs_15437 branch November 28, 2025 09:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Cherry-Pick a cherry pick

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants